Nick Feamster CS 4251 Computer Networking II Spring 2008

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Chapter 12 Media Access Control (MAC)
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Wireless Communication and Networks
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Nick Feamster CS 4251 Computer Networking II Spring 2008 Medium Access Control Nick Feamster CS 4251 Computer Networking II Spring 2008

Some Multiple Access Protocols CSMA/CD Token passing Wireless LAN Protocols

Random Access MAC Protocols Non-Carrier-Sense protocols: doesn’t “listen” to the channel before transmitting ALOHA Carrier-Sense protocols: senses the channel before transmitting CSMA (Carrier Sense Multiple Access): does not detect collision. CSMA/CD (Ethernet): A node “listens” before/while transmitting to determine whether a collision happens.

ALOHA Radio-based communication network Developed in 1970s at the Univ of Hawaii Basic idea: transmit when a node has data to be sent. Receiver sends ACK for data Detect collisions by timing out for ACK Recover from collision by trying after random delay Too short: large number of collisions Too long: underutilization

Ethernet MAC If line is idle (no carrier sensed) send packet immediately If line is busy (carrier sensed) wait until idle and transmit packet immediately If collision detected Stop sending and jam signal Jam signal: make sure all other transmitters are aware of collision Wait a random time (Exponential backoff), and try again

Questions How does sender detect collision? How long does it take?

Ethernet Performance Ethernets work best under light loads Utilization over 30% is considered heavy Peak throughput worse with More hosts More collisions needed to identify single sender Smaller packet sizes More frequent arbitration Longer links Collisions take longer to observe, more wasted bandwidth

Ethernet MAC Protocol

Carrier Sense Multiple Access (CSMA) Listen to medium and wait until it is free (no one else is talking) Wait a random backoff time Advantage: Simple to implement Disadvantage: Cannot recover from a collision

Wireless Interference Two transmitting stations interfere with each other at the receiver Receiver gets garbage A B C

Carrier Sense Multiple Access with Collision Detection (CSMA-CD) Procedure Listen to medium and wait until it is free Start talking, but listen to see if someone else starts talking too If collision, stop; start talking after a random backoff time Used for hub-based Ethernet Advantage: More efficient than basic CSMA Disadvantage: Requires ability to detect collisions More difficult in wireless scenario

Collision Detection in Wireless No “fate sharing” of the link High loss rates Variable channel conditions Radios are not full duplex Cannot simultaneously transmit and receive Transmit signal is stronger than received signal

Solution: Link-Layer Acknowledgments Absence of ACK from receiver signals packet loss to sender Sender interprets packet loss as being caused by collision Problem: Does not handle hidden terminal cases.

Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) Similar to CSMA but control frames are exchanged instead of data packets RTS: request to send CTS: clear to send DATA: actual packet ACK: acknowledgement

Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) Small control frames lessen the cost of collisions (when data is large) RTS + CTS provide “virtual carrier sense” protects against hidden terminal A B

Random Contention Access Slotted contention period Used by all carrier sense variants Provides random access to the channel Operation Each node selects a random backoff number Waits that number of slots monitoring the channel If channel stays idle and reaches zero then transmit If channel becomes active wait until transmission is over then start counting again

Virtual Carrier Sense Provided by RTS & CTS Prevents hidden terminal collisions Typically unnecessary RTS CTS A B C

Physical Carrier Sense Range Carrier can be sensed at lower levels than packets can be received Results in larger carrier sense range than transmission range More than double the range in NS2 802.11 simulations Long carrier sense range helps protect from interference Receive Range Carrier Sense Range

Hidden Terminal Revisited Virtual carrier sense no longer needed in this situation RTS CTS A B C Physical Carrier Sense

Physical Carrier Sense Energy detection threshold Monitors channel during “idle” times between packets to measure the noise floor Energy levels above the this noise floor by a threshold trigger carrier sense DSSS correlation threshold Monitors the channel for Direct Sequence Spread Spectrum (DSSS) coded signal Triggers carrier sense if the correlation peak is above a threshold More sensitive than energy detection (but only works for 802.11 transmissions) High BER disrupts transmission but not detection